Get to know our list of activities and events
Registration and breakfast
Opening Keynote - Interactive discussion
Donald Freese, Federal Bureau of Investigation
This fireside chat will help you understand nation-state adversaries and the evolution of risk management through strategic application of threat intelligence. You will learn disruption strategies regarding intrusions and attacks before they impact your business, as well as ways to develop action plans that create a stronger connection between your enterprise and the FBI.
Donald Freese, former director of the National Cyber Investigative Joint Task Force (NCIJTF), recently promoted to the FBI’s Information Technology Branch, Enterprise Services and Risk Management
The How-To’s of Information Sharing
In this session, you will hear specific recommendations on how to successfully share threat intelligence, ways to forge beneficial relationships with participating industry bodies, and key partnerships you should have in place that can be helpful to you and your organization.
Dax Streater, Manager at Cybersecurity Operations at LCRA
Calling All Guards
Organizations face real challenges regarding talent recruitment for their cybersecurity programs. Savvy pros are needed not only to implement the latest tools, but to make sense of the myriad streams of data being gathered and correlated to help thwart and address immediate attacks. Hear how successful organizations are addressing this issue and what you can do to find the talent you need.
Expo Floor Opens & Networking Break
4 track tech sessions
4 TRACK CYBER 360 CLINICS
The Cyber 360 clinics are four one-hour facilitated experiences designed to immerse attendees in interactive exercises and discussions giving them a 360-degree view of an issue. Attendees will work through key challenges where they will need to apply what they have learned.
Cyber 360 Clinic 1
Automating Threat Intelligence
Hear practical areas to consider when building and managing your threat intel strategy. Gain an understanding on how to ensure you have the right technologies and processes in place, what you should buy and the best options for your budget.
Cyber 360 Clinic 2
Ransom EVERY ware
Learn key methods for detection and remediation for ransomware through this hands-on workshop.
Mary Chaney, Senior Director of Corporate Information Security at Comcast Corporation, and Henry Jiang, CISO at Oppenheimer & Co
Cyber 360 Clinic 3
Managing the Mobile Threat
Gain a clearer perspective on ways to manage mobile threats and where technology and policy must intersect.
Cyber 360 Clinic 4
Indicators of Compromise
Learn how organizations can leverage data from within their organization’s infrastructure to build a stronger kill-chain model and to increase shared information through wider peer relationships while increasing threat indicator performance.
Networking Lunch and Expo Floor
Intelligent Connection Discussion Roundtables
Expo & Afternoon Break
Intelligent Connection Wrap Up
The Trump Effect on Information Security: Is Less Regulation What We Need?
The new administration is promising an environment of reduced regulation and oversight. That environment, while welcome by some, will increase the need for effective and clear communication between your partners and regulators. Learn ways to make this new paradigm work so that it doesn’t cause additional turmoil for your business.
Vicky Ames, Director of Information Security at Marriott International, and Daniel Hoffman, Former Intelligence Officer
Reboot Northeastern Awards
ICON is an invite-only half-day track. For consideration of an invitation to I.C.O.N.
please email firstname.lastname@example.org
Icon: A half-day international clinic for CSO’s
10:30AM to 3:20 PM
This clinic will tackle challenges from a technical, corporate and a policy perspective within both domestic and international realms. This new feature is specifically for senior cybersecurity leaders. This is a must attend event for any C level cybersecurity professional in the NY and Tri-state area.
Inside a Breach
From Risk to Reality
Here we will get a first hand view of a network breach in process. Tricks of the bad guy, what they are after vs. what is the risk, ways they avoid being noticed and of course suggestions on risk reduction techniques.
Lance James, chief scientist at Flashpoint
The not so New Network Solution
The Future of IT in the Cloud
Some experts and security practitioners understand that their future IT departments will be wholly in the cloud. What network level solutions are being replaced and what cloud solutions have or haven’t worked? With that paradigm shift, what are the new strategies for managing security?
The Mobile Policy Dilemma
The fact that organizations worldwide are embracing mobile is old news. However the struggle internationally in the private sector and government for how to make and enforce policies continues. What are some successful policies for network access for organizational owned devices vs. BYOD? How can policy and technology help smooth the path to success here?
From profiling the bad guys to understanding software vulnerabilities and attack points and beyond, threat modeling has become a valuable tool for organizations to tune both technology and human resources in order to better protect assets and the brand. The attacker may not be changing, but the velocity and sophistication of attacks surely are. Learn how threat modeling can help you cope.